Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wi-Fi Security

Buy
Wi-Fi Security, 9780071410731 (0071410732), McGraw-Hill, 2003
COMPLETE COVERAGE OF THE TECHNOLOGY THAT’S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!

Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill’s WiFi Security, your company’s mission-critical data can be safeguarded, even against hackers intent on exploiting vulnerabilities in your business’s network brought on by wireless communications.

Written with insight by a leading wireless security expert, WiFi Security:
* Deals explicitly with wireless security for Windows 2000/XP, MAC OS X, Linux, Lindows OS, Palm OS, and PocketPC platforms
* Reviews security approaches for the different standards currently competing for the U. S. market
* Addresses data compromise, unauthorized access, and denial of service — all critical to WLAN users
* Covers the 802.11 IEEE standard with regard to security, performance, and throughput
* Discusses encryption and privacy through the Wireless Equivalent Privacy (WEP) protocol
* And much, much more!

About the Author

Stewart Miller (Carlsbad, CA) has been actively consulting many organizations and publishing books, articles, and detailed technical reports about ERP solutions for over ten years in all Information Technology industry sectors. Miller has worked extensively with PeopleSoft, SAP, Baan, and J.D. Edwards.

(HTML tags aren't allowed.)

Energy Justice Across Borders
Energy Justice Across Borders

This book is open access under a CC BY 4.0 license.

We must find new and innovative ways of conceptualizing transboundary energy issues, of embedding concerns of ethics or justice into energy policy, and of operationalizing response to them. This book stems from the emergent gap;...

Pro SharePoint with jQuery
Pro SharePoint with jQuery
In 2009, Lightning Tools decided to take one of its best-selling products, a desktop application, and put it into the browser as an application page in SharePoint—which turned out to be quite a challenge. When we were looking at technologies to use, jQuery stood out as something that could be really helpful. We spent a lot of...
Voyager
Voyager

From the author of the breathtaking bestsellers Outlander and Dragonfly in Amber, the extraordinary saga continues.

Their passionate encounter happened long ago by whatever measurement Claire Randall took. Two decades before, she had traveled back in time and into the arms of a gallant eighteenth-century Scot named...


Broken Agile: Second Edition
Broken Agile: Second Edition

Learn how to be successful in adopting Agile and see good and bad examples of how Agile can be adopted. Broken Agile, Second Edition contains stories from years of real world experience on Agile teams and projects. The stories in each chapter are both educational and entertaining. Each chapter focuses on specific Agile values...

NOOK HD: The Missing Manual
NOOK HD: The Missing Manual

You can do many things with NOOK HD right out of the box, but if you really want to get the most from your HD or HD+ tablet, start with this book. With clear instructions, full-color illustrations, and savvy advice from technology expert Preston Gralla, you’ll learn how to use email and the Web, watch movies and shows, play...

Thinking Recursively
Thinking Recursively
At its essence, computer science is the study of problems and their solutions. More specifically, computer science is concerned with finding systematic procedures that guarantee a correct solution to a given problem. Such procedures are called algorithms.

This book is about a particular class of algorithms, called recursive algorithms,
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy